Write a report and develop the presentation

Assignment Help Other Subject
Reference no: EM131371797

Preventing Security Issues via a Network and Information Security Solution: 
An Analytical Report

In the following sections the details and procedures for each of these tasks is discussed:

Task 1. Research, purchase, and delivery of all equipment and software needed.

Task 2. Installation and configuration of all hardware and software.

After receiving the delivered equipment we immediately began installation.

Task 3. Implementation and monitoring of new network

Task 4. Writing, review, approval, and distribution of network documentation.

Progress report:-

Purpose
This is a progress report on the research done by the Information Security Department on possible vulnerabilities that could be exploited in Hip Hop's-main computer system through the use of a vulnerability assessment.

Task 1. To acquire a baseline of all of the systems that needs to be tested by the White Box Testing to be performed by the Information Security Department Hip Hop socks.

This was an important task to accomplish before performing task two because it gave our department and idea on where to begin our testing. Valuable time was saved because we were not working on something that could not be there. During our baseline systems test, there were several different key machines/systems that we recognized to be top priority.

These top priority systems were:

Task 2: Perform the White box test on the previously known systems.
This task out of the six tasks was the most important to complete accurately. It is a test to see if there is any potential vulnerability that can become exploited by hackers to steal important confidential information. This test would determine if an individual with previous knowledge of our system, aka an insider threat, or an individual who acquired knowledge on our system could try to actually compromise our network.

The main programs that were run to check for possible vulnerabilities are as follows:
• Khali Linux
• BackTrack
• Metasploit
• Nessus
• Nmap

After running all the following programs some initial data is starting to present itself. Some of the information being presented is both good and possibly bad but would require more in depth research to see the exact problems that could occur if the vulnerability were left open to the public.

Future Work
We are currently working with XYZ the outside contractor, to complete a Black Box test. We will then begin Task 4, to analyze all of the found vulnerabilities that could potentially be exposed from both tests.

Task 3: Perform the Black Box Test.

Task 4: Analyze the research and progress that both the White Box and Black Box test found.

Task 5: Research methods to solve any potential vulnerabilities found in the systems.

Task 6: Create a recommendation report for any of the potential vulnerabilities found.

Reflection paper:

Write a reflection paper.

Compose an approximate 750 to 1,000 word paper describing your experience writing the report and developing the presentation. Include these topics in your description:

• Your process of writing the report including determining your audience, analyzing the data, and organizing the information
• Your process of developing your presentation including identifying and organizing your content
• Your reasons for choosing the type of graphic(s) you used and why the graphic(s) are appropriate for the report and presentation

• The following is very important:
• Lessons you have learned from developing these documents
• Ways in which you can apply this experience in your professional, academic, or personal work
• Why this class worked for you or didn't.

Memo:-
Purpose
The purpose of this proposal is to request a study and analyze the implementation and eventual widespread use of a policy that will reduce the threat of a current or former employee divulging sensitive or proprietary company information to a competitor or a current employee accidentally leaking information due to an unintentional data spill.

Tasks
In order to solve the problem, I am proposing that these tasks be completed:

Task 1: Consult case-study data on similar problems found in organizations and annotate how the problem was fixed for that organization.

Task 2: Search online internet resources/library databases for more information on mitigating the insider threat and implementing a solution within an organization.

Task 3: Survey of current and former IT security professionals on ideas for securing protected company information/access to company resources.

Task 4: Research successful companies with comprehensive insider threat policies already implemented.

Schedule: A graph/timeline works well for this

Task 1: Determine the needs of company

Task 2: Research Display Sizes

Task 3: Research XYZ

Task 4: ResearchABC

Task 5: Final Report / Implementation

Attachment:- Assignment.rar

Reference no: EM131371797

Questions Cloud

Define statistics with citation and reference : Define statistics with citation and reference. Contrast quantitative data and qualitative data. Use two Peer Reviewed references. Evaluate tables and charts used to represent quantitative and qualitative data.
Hot to transfer heat : Thermal conductors don't have to be hot to transfer heat. a) According to Ch.16, explain a situation when an ice cube would still transfer heat to another object it is in contact with ? and B) What is a medium?
Which is proper response with regards to length of copyright : BAM 530- From an ethical perspective, which is the proper response with regards to the length of a copyright? The EEO laws require an employer to give greater care to ____________ than many employers did prior to the laws.
Heat to the environment : As 390 g of hot milk cools in a mug, it transfers 30,000 J of heat to the environment. What is the temperature change of the milk? The specific heat of milk is 3.9 J/g·°C. Show your work for credit.
Write a report and develop the presentation : Compose a paper describing your experience writing the report and developing the presentation.- Analyze the research and progress that both the White Box and Black Box test found.
What should sparrow pharmaceuticals do : What should Sparrow Pharmaceuticals do? Do you think it is ethical to use customer information across multiple divisions of the same company? Explain.
How each style would affect the way he would communicate : Explain how each style would affect the way he or she would communicate, negotiate, and apply this to interpersonal situations.
Define vector b and the stiffness matrix a for the system : ME209 Mathematical Modelling and Analysis Assignment - Framework Design. Define vector B and the stiffness matrix A for the system in Matlab and compute the unknown vector X using matrix methods using Matlab
Briefly describe the three aspects : BUS 101 - Briefly describe the three aspects of TPG's advertising which the ACCC considered to be defective and what two ways did the Full Court take a different approach from that of the primary judge in deciding whether the TPG advertising was mi..

Reviews

Write a Review

Other Subject Questions & Answers

  E-compensation tools in the job-evaluation process

Justify the use of e-Compensation tools in the job-evaluation process from the perspective of HR, management, and the employee. (200-250 words, please cite your source)

  Imagine that you are the manager of a sandwich shop based

a marketing agency is interested in the buying habits of those who shop online versus those who shop in person. in your

  How human activities can cause an imbalance

Explain how human activities can cause an imbalance in biogeochemical cycling and lead to problems such as cultural eutrophication and fish kills

  What is agriculture

What is agriculture? When, where , and why did it first emerge? what are the social effects of agriculture? What are the social effects of agriculture? How did agriculture lead to changes in humans' relationalship with their environments?

  How do social forces play a role in our lives

How do social forces play a role in our lives

  What potential benefits and dangers of broad consolidation

In terms of demand and supply of both health care services and the "factors of production" specifically the labor supply (physicians, clinicians, etc.) is healthcare heading down the same path as the financial services industry--dominated by sever..

  Implementing the world environmental regime

Implementing the World Environmental Regime (from The Biodiversity Treaty to the end of the section), Sustainable Development, and Fighting Back.

  What is nationalism

What is Nationalism? What are the characteristics of nationalism in music?

  Discuss what you liked about the diversity plan

For this assignment, you will choose a company and find their Diversity Plan. In 1-2 pages: Provide background on the company you have chosen and then summarize the Diversity Plan. In 1-2 paragraphs: Discuss what you liked about the Diversity Plan

  A brief review of the current empirical research

A brief review of the current empirical research regarding the construction of the nervous system and its role in shaping behavior. A discussion of the controversies surrounding research on the nervous system.

  Explain how the concept of midlife crisis relates to lives

Relate Erikson's work specifically to personal priority rearrangements that may occur in middle adulthood - Explain how the concept of midlife crisis relates to lives of midlife males, transgender individuals, and females.

  Bar magnet is falling toward the center of a loop of wire

A bar magnet is  falling toward the center of a loop of wire, with the north pole  oriented downward. Viewed from the same side of the loop as the magnet,  as the north pole approaches the loop, what is the direction of the  induced current?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd